CSpace

浏览/检索结果: 共10条,第1-10条 帮助

已选(0)清除 条数/页:   排序方式:
Structural analysis and vulnerability assessment of the European LNG maritime supply chain network (2018-2020) 期刊论文
OCEAN & COASTAL MANAGEMENT, 2024, 卷号: 253, 页码: 20
作者:  Mei, Qiang;  Hu, Qinyou;  Hu, Yu;  Yang, Yang;  Liu, Xiliang;  Huang, Zishuo;  Wang, Peng
收藏  |  浏览/下载:7/0  |  提交时间:2024/12/06
Liquefied natural gas  Supply chain security  Maritime transportation network  Vulnerability  Community evolution  Graph deep learning  
SPFL: A Self-Purified Federated Learning Method Against Poisoning Attacks 期刊论文
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 卷号: 19, 页码: 6604-6619
作者:  Liu, Zizhen;  He, Weiyang;  Chang, Chip-Hong;  Ye, Jing;  Li, Huawei;  Li, Xiaowei
收藏  |  浏览/下载:2/0  |  提交时间:2024/12/06
Data models  Servers  Training  Hidden Markov models  Training data  Adaptation models  Security  Federated learning  poisoning attack  knowledge distillation  attention maps  deep neural network  
Security risk and response analysis of typical application architecture of information and communication blockchain 期刊论文
NEURAL COMPUTING & APPLICATIONS, 2020, 页码: 11
作者:  Zhao, Hongwei;  Zhang, Moli;  Wang, Shi;  Li, Entang;  Guo, Zhenhua;  Sun, Dianmin
收藏  |  浏览/下载:43/0  |  提交时间:2021/12/01
Information and communication blockchain  Network security risks  Homomorphic verifiable secret sharing  Risk response  
Enabling Secure NVM-Based in-Memory Neural Network Computing by Sparse Fast Gradient Encryption 期刊论文
IEEE TRANSACTIONS ON COMPUTERS, 2020, 卷号: 69, 期号: 11, 页码: 1596-1610
作者:  Cai, Yi;  Chen, Xiaoming;  Tian, Lu;  Wang, Yu;  Yang, Huazhong
收藏  |  浏览/下载:328/0  |  提交时间:2020/12/10
Artificial neural networks  Nonvolatile memory  Encryption  Computational modeling  Hardware  Non-volatile memory (NVM)  compute-in-memory (CIM)  neural network  security  encryption  
Context aware intrusion detection for building automation systems 期刊论文
COMPUTERS & SECURITY, 2019, 卷号: 85, 页码: 181-201
作者:  Pan, Zhiwen;  Hariri, Salim;  Pacheco, Jesus
收藏  |  浏览/下载:85/0  |  提交时间:2019/12/10
Internet of Things  Network security  Context awareness  Supervised learning  Data mining  Intrusion detection  
Causality reasoning about network events for detecting stealthy malware activities 期刊论文
COMPUTERS & SECURITY, 2016, 卷号: 58, 页码: 180-198
作者:  Zhang, Hao;  Yao, Danfeng (Daphne);  Rarnakrishnan, Naren;  Zhang, Zhibin
收藏  |  浏览/下载:49/0  |  提交时间:2019/12/13
Network security  Anomaly detection  Stealthy maiware  Traffic analysis  Dependence analysis  Machine learning classification  
A lightweight web server anomaly detection method based on transductive scheme and genetic algorithms 期刊论文
COMPUTER COMMUNICATIONS, 2008, 卷号: 31, 期号: 17, 页码: 4018-4025
作者:  Li, Yang;  Guo, Li;  Tian, Zhi-Hong;  Lu, Tian-Bo
收藏  |  浏览/下载:49/0  |  提交时间:2019/12/16
Network security  Web server anomaly detection  TCM-KNN algorithm  Genetic algorithm  
An active learning based TCM-KNN algorithm for supervised network intrusion detection 期刊论文
COMPUTERS & SECURITY, 2007, 卷号: 26, 期号: 7-8, 页码: 459-467
作者:  Li, Yang;  Guo, Li
收藏  |  浏览/下载:44/0  |  提交时间:2019/12/16
network security  intrusion detection  TCM-KNN (Transductive Confidence Machines for K-Nearest Neighbors)  algorithm  machine learning  active learning  
Topologically-aware AAA overlay network in mobile IPv6 environment 期刊论文
NETWORKING 2006: NETWORKING TECHNOLOGIES, SERVICES, AND PROTOCOLS; PERFORMANCE OF COMPUTER AND COMMUNICATION NETWORKS; MOBILE AND WIRELESS COMMUNICATIONS SYSTEMS, 2006, 卷号: 3976, 页码: 293-306
作者:  Li, Jun;  Ye, Xin-ming;  Tian, Ye
收藏  |  浏览/下载:42/0  |  提交时间:2019/12/16
mobile IPv6  AAA  overlay network  performance  security  
A novel computer architecture to prevent destruction by viruses 期刊论文
JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2002, 卷号: 17, 期号: 3, 页码: 241-248
作者:  Gao, QH;  Hu, Y;  Li, L;  Chen, X;  Liu, HL
收藏  |  浏览/下载:77/0  |  提交时间:2019/12/16
computer architecture  network security  computer virus